{"id":11449,"date":"2025-07-29T11:00:34","date_gmt":"2025-07-29T09:00:34","guid":{"rendered":"https:\/\/staging.netxconsult.de\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/"},"modified":"2025-09-12T13:38:52","modified_gmt":"2025-09-12T11:38:52","slug":"passkeys-in-microsoft-what-it-admins-and-companies-need-to-know","status":"publish","type":"post","link":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/","title":{"rendered":"Passkeys in Microsoft &#8211; What IT admins and companies need to know!"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:40px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:40;line-height:1.14;\"><h2>The era after the password<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-1\"><p>Traditional passwords are inferior in several ways: they are susceptible to phishing, are often considered weak or are used multiple times &#8211; which makes them the main target of attacks. Microsoft&#8217;s strategy for greater security and relief for admins: away from passwords and towards passwordless passkeys.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:40px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:40;line-height:1.14;\"><h2><!--ScriptorStartFragment--><\/h2>\n<h2>What are passkeys &#8211; and why are they more secure?<\/h2>\n<h2><!--ScriptorEndFragment--><\/h2><\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><p>A passkey is not a password in the traditional sense, but a cryptographic key pair consisting of a public and a private key. The public key remains on the server, the private key remains securely stored on the device, typically in the secure hardware environment &#8211; TPM, Secure Enclave or app container.<\/p>\n<p><b>Safety benefits:<\/b><\/p>\n<\/div><ul style=\"--awb-line-height:34px;--awb-icon-width:34px;--awb-icon-height:34px;--awb-icon-margin:14px;--awb-content-margin:48px;--awb-circlecolor:#f86011;--awb-circle-yes-font-size:17.6px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>No server stores sensitive private data &#8211; hackers only receive ineffective public keys.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Implemented biometrics (fingerprint, facial recognition) or PIN protects against unauthorized use.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Natural protection against phishing: Private keys are never transmitted and cannot be intercepted.<\/p>\n<\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"600\" height=\"449\" alt=\"The picture shows a person using a biometric procedure to log in, to the astonishment of his colleagues\" title=\"BeiometrischerLogin\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/BeiometrischerLogin-600x449.jpg\" class=\"img-responsive wp-image-11427\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/BeiometrischerLogin-200x150.jpg 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/BeiometrischerLogin-400x300.jpg 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/BeiometrischerLogin-600x449.jpg 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/BeiometrischerLogin.jpg 801w\" sizes=\"(max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:40px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:40;line-height:1.14;\"><h2><!--ScriptorStartFragment--><\/h2>\n<h2>How passkey login works in practice<\/h2>\n<h2><!--ScriptorEndFragment--><\/h2>\n<h2><!--ScriptorEndFragment--><\/h2>\n<h2><!--ScriptorEndFragment--><\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-3\"><p><!--ScriptorStartFragment--><\/p>\n<div class=\"scriptor-paragraph\">Logging in is intuitive and lightning fast: users click on &#8220;Use passkey&#8221; in Microsoft 365 and confirm by fingerprint, facial recognition or PIN &#8211; on the same or a synchronized device. The challenge is resolved by the private key and sent back to the server.<\/div>\n<div class=\"scriptor-paragraph\">For multi-device scenarios (e.g. laptop and iPhone), systems can be synchronized or linked via QR code.<!--ScriptorEndFragment--><\/div>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:40px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:40;line-height:1.14;\"><h2><!--ScriptorStartFragment--><\/h2>\n<h2>Microsoft&#8217;s integration of passkeys &#8211; an overview<!--ScriptorEndFragment--><\/h2>\n<h2><!--ScriptorEndFragment--><\/h2><\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"600\" height=\"449\" alt=\"In the foreground is a woman surrounded by various logos of Microsoft products which can now be unlocked with a passkey\" title=\"Passkey_M365\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/Passkey_M365-600x449.jpg\" class=\"img-responsive wp-image-11431\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/Passkey_M365-200x150.jpg 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/Passkey_M365-400x300.jpg 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/Passkey_M365-600x449.jpg 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/Passkey_M365.jpg 801w\" sizes=\"(max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><p>Microsoft is integrating Passkeys in the Entra ID environment &#8211; the former Azure AD. The technology is already available and can be configured.<\/p>\n<p><b>Supported authenticator types:<\/b><\/p>\n<\/div><ul style=\"--awb-line-height:34px;--awb-icon-width:34px;--awb-icon-height:34px;--awb-icon-margin:14px;--awb-content-margin:48px;--awb-circlecolor:#f86011;--awb-circle-yes-font-size:17.6px;\" class=\"fusion-checklist fusion-checklist-2 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Microsoft Authenticator app (iOS\/Android) for registration via passkeys<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Windows Hello on modern Windows devices<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">FIDO2 Security Keys (e.g. YubiKey)<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Browser with passkey support (Edge, Chrome, Safari)<\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:40px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:40;line-height:1.14;\"><h2><!--ScriptorStartFragment--><\/h2>\n<h2>Advantages for companies and Microsoft admins<!--ScriptorEndFragment--><\/h2>\n<h2><!--ScriptorEndFragment--><\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-5\"><p><span style=\"background-color: rgba(0, 0, 0, 0);\"><b>There are clear advantages for security managers and IT managers:<\/b><\/span><\/p>\n<\/div><ul style=\"--awb-line-height:34px;--awb-icon-width:34px;--awb-icon-height:34px;--awb-icon-margin:14px;--awb-content-margin:48px;--awb-circlecolor:#f86011;--awb-circle-yes-font-size:17.6px;\" class=\"fusion-checklist fusion-checklist-3 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-lock fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Maximum security &#8211; public-private key pairs are highly resistant to hacker attacks and phishing<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-history fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Less support effort &#8211; no password reset, fewer helpdesk tickets<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-grin-beam fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Better UX &#8211; fast, intuitive authentication without entering a password<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-shipping-fast fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Efficiency gains &#8211; time savings due to less password management and complexity<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-gavel fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Compliance boost &#8211; modern authentication procedures underpin zero trust strategies<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:40px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:40;line-height:1.14;\"><h2><!--ScriptorStartFragment--><\/h2>\n<h2>Current status &amp; roadmap<!--ScriptorEndFragment--><\/h2>\n<h2><!--ScriptorEndFragment--><\/h2>\n<h2><!--ScriptorEndFragment--><\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-6\"><p><span style=\"background-color: rgba(0, 0, 0, 0);\"><b>There are clear advantages for security managers and IT managers:<\/b><\/span><\/p>\n<\/div><ul style=\"--awb-line-height:34px;--awb-icon-width:34px;--awb-icon-height:34px;--awb-icon-margin:14px;--awb-content-margin:48px;--awb-circlecolor:#f86011;--awb-circle-yes-font-size:17.6px;\" class=\"fusion-checklist fusion-checklist-4 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">Public preview available since the beginning of 2024<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Globally available planned for 2nd half of 2025<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Upcoming functions:<\/p>\n<ul>\n<li><span style=\"background-color: rgba(255, 255, 255, 0);\">Integration in local AD environments (hybrid scenarios)<\/span><\/li>\n<li>Self-service passkey registration &amp; recovery<\/li>\n<li><!--ScriptorStartFragment-->Management via Conditional Access &amp; Entra Policies <!--ScriptorEndFragment--><\/li>\n<\/ul>\n<\/div><\/li><\/ul><div class=\"fusion-text fusion-text-7\"><p><!--ScriptorStartFragment--><\/p>\n<div class=\"scriptor-paragraph\">Current research (e.g. device bound vs. synced credentials) shows that passkeys offer a high level of security, but special care is required when synchronizing across multiple devices &#8211; the risk here lies with the passkey provider.<\/div>\n<div class=\"scriptor-paragraph\">On June 27, 2025, Microsoft released the Windows 11 Insider Preview Build 26120.4520 (KB5060834) in the beta channel. This contains an important milestone for the passwordless future: the integration of third-party credential managers directly into the Windows login settings.<\/div>\n<div class=\"scriptor-paragraph\"><\/div>\n<p>What does that mean in concrete terms?<\/p>\n<p><span style=\"background-color: rgba(0, 0, 0, 0);\">Users can go to <\/span><b style=\"background-color: rgba(0, 0, 0, 0);\"><i>Settings &gt; Passkeys &gt; Advanced options<\/i> <\/b><span style=\"background-color: rgba(0, 0, 0, 0);\">to activate the so-called Plugin Credential Manager. <\/span><\/p>\n<ul class=\"\">\n<li class=\"scriptor-listItemlist!list-5fdd7e81-b855-4bd6-97c3-436471771cc86\">Prerequisite: Authentication via Windows Hello (face, fingerprint or PIN).<\/li>\n<li class=\"scriptor-listItemlist!list-5fdd7e81-b855-4bd6-97c3-436471771cc86\">The function is currently being tested with the beta version of 1Password, with other providers to follow.<\/li>\n<\/ul>\n<p><!--ScriptorEndFragment--><\/p>\n<div class=\"scriptor-paragraph\"><!--ScriptorEndFragment--><\/div>\n<\/div><div class=\"fusion-text fusion-text-8\"><p><!--ScriptorStartFragment--><\/p>\n<h3 class=\"fusion-responsive-typography-calculated\" style=\"--fontsize: 32; line-height: 1.26;\" data-fontsize=\"32\" data-lineheight=\"40.32px\">What&#8217;s new? &#8211; Briefly summarized!<\/h3>\n<p><span style=\"font-size: 20px; letter-spacing: normal; background-color: rgba(0, 0, 0, 0);\"><strong>Login to websites<\/strong>:<br \/>\n<\/span>Passkeys from the third-party vault (e.g. 1Password) can be used directly to log in &#8211; one click, one authentication, done.<br \/>\n<span style=\"background-color: rgba(0, 0, 0, 0);\"><br \/>\n<b>Saving new passkeys:<br \/>\n<\/b><\/span><span style=\"background-color: rgba(0, 0, 0, 0);\">When visiting passkey-enabled websites, new keys can be created and saved in the Credential Manager &#8211; also secured by Windows Hello.<\/span><\/p>\n<div class=\"scriptor-paragraph\"><\/div>\n<div class=\"scriptor-paragraph\"><b>Cross-device use:<br \/>\n<\/b><span style=\"background-color: rgba(0, 0, 0, 0);\">By opening up the plugin interface (API), it will be possible in future to use the same passkeys securely on multiple devices and across different providers.<\/span><\/div>\n<div class=\"scriptor-paragraph\"><\/div>\n<div class=\"scriptor-paragraph\"><b>Important note:<\/b><\/div>\n<div class=\"scriptor-paragraph\">Microsoft is no longer just building the passwordless future into the core system, but modular and open to the ecosystem. For companies, this means that the hurdles for introducing Passkey are lowered &#8211; especially if solutions such as 1Password, Bitwarden or similar are already in use.<\/div>\n<p><!--ScriptorEndFragment--><\/p>\n<p><!--ScriptorEndFragment--><\/p>\n<div class=\"scriptor-paragraph\"><!--ScriptorEndFragment--><\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:40px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:40;line-height:1.14;\"><h2>How to get started &#8211;<br \/>\nRecommendations for IT managers and admins<\/h2>\n<h2><!--ScriptorEndFragment--><\/h2>\n<h2><!--ScriptorEndFragment--><\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-9\"><p><!--ScriptorStartFragment--><\/p>\n<ol class=\"scriptor-listCounterlist!list-5fdd7e81-b855-4bd6-97c3-436471771cc84 scriptor-listCounterResetlist!list-5fdd7e81-b855-4bd6-97c3-436471771cc84\">\n<li class=\"scriptor-listItemlist!list-5fdd7e81-b855-4bd6-97c3-436471771cc84\"><b>Check infrastructure:<\/b> Device policy, licenses, BIOS\/firmware settings<\/li>\n<li class=\"scriptor-listItemlist!list-5fdd7e81-b855-4bd6-97c3-436471771cc84\"><b>Define pilot group:<\/b> IT-savvy users with low complexity<\/li>\n<li class=\"scriptor-listItemlist!list-5fdd7e81-b855-4bd6-97c3-436471771cc84\"><b>Test passkey registration:<\/b> e.g. via the Microsoft Authenticator app<\/li>\n<li class=\"scriptor-listItemlist!list-5fdd7e81-b855-4bd6-97c3-436471771cc84\"><b>Design policies: <\/b>Conditional access, MFA fallback, recovery scenarios<\/li>\n<li class=\"scriptor-listItemlist!list-5fdd7e81-b855-4bd6-97c3-436471771cc84\"><b>Ensure communication:<\/b> training courses, FAQs, information workshops<\/li>\n<li class=\"scriptor-listItemlist!list-5fdd7e81-b855-4bd6-97c3-436471771cc84\"><b>Monitoring &amp; support:<\/b> check logins, establish helpdesk processes<\/li>\n<\/ol>\n<p><!--ScriptorEndFragment--><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:40px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:40;line-height:1.14;\"><h2>Conclusion &#8211; The passwordless future starts now!<\/h2>\n<h2><!--ScriptorEndFragment--><\/h2>\n<h2><!--ScriptorEndFragment--><\/h2><\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\"><p><!--ScriptorStartFragment--><\/p>\n<div class=\"scriptor-paragraph\">Passkeys are not a theory &#8211; they are ready for use and increasingly universally supported. For companies that want to combine security with usability, now is the starting signal. IT management &amp; security must seize the momentum and introduce passkeys strategically.<\/div>\n<p>We are happy to help you with the implementation of Passkeys in your Microsoft environment, please take a look at our FAQ on this topic.<\/p>\n<p><!--ScriptorEndFragment--><\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--awb-padding-right:130px;--awb-padding-left:130px;\" target=\"_self\" href=\"https:\/\/netxconsult.de\/en\/blog\/faq-items\/passkeys-in-microsoft-das-sind-eure-optionen\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">FAQ: Passkeys in Microsoft &#8211; These are your options<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"600\" height=\"449\" title=\"NoPasswords\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/NoPasswords-600x449.jpg\" alt class=\"img-responsive wp-image-11429\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/NoPasswords-200x150.jpg 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/NoPasswords-400x300.jpg 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/NoPasswords-600x449.jpg 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/NoPasswords.jpg 801w\" sizes=\"(max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":11433,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[333],"tags":[318,270,319,317],"class_list":["post-11449","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-en_it_security","tag-it-security-en","tag-microsoft-en","tag-microsoft-entra-en","tag-microsoft-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Passkeys \u2013 What IT Admins and Businesses Must Know<\/title>\n<meta name=\"description\" content=\"Microsoft Passkeys explained: discover the two variants, their security benefits, and how businesses can successfully implement passkeys.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Passkeys \u2013 What IT Admins and Businesses Must Know\" \/>\n<meta property=\"og:description\" content=\"Microsoft Passkeys explained: discover the two variants, their security benefits, and how businesses can successfully implement passkeys.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"netX consult\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-29T09:00:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-12T11:38:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/Passkeys_Microsoft.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Manuel Mayer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel Mayer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\\\/\"},\"author\":{\"name\":\"Manuel Mayer\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/2a71da04439b566eb6d3d3719e41f764\"},\"headline\":\"Passkeys in Microsoft &#8211; What IT admins and companies need to know!\",\"datePublished\":\"2025-07-29T09:00:34+00:00\",\"dateModified\":\"2025-09-12T11:38:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\\\/\"},\"wordCount\":8091,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Passkeys_Microsoft.jpg\",\"keywords\":[\"IT-Security\",\"Microsoft\",\"Microsoft Entra\",\"Microsoft Security\"],\"articleSection\":[\"EN_IT_Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\\\/\",\"name\":\"Microsoft Passkeys \u2013 What IT Admins and Businesses Must Know\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Passkeys_Microsoft.jpg\",\"datePublished\":\"2025-07-29T09:00:34+00:00\",\"dateModified\":\"2025-09-12T11:38:52+00:00\",\"description\":\"Microsoft Passkeys explained: discover the two variants, their security benefits, and how businesses can successfully implement passkeys.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Passkeys_Microsoft.jpg\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Passkeys_Microsoft.jpg\",\"width\":1800,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Passkeys in Microsoft &#8211; What IT admins and companies need to know!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"name\":\"netX consult\",\"description\":\"IT-Beratung\",\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\",\"name\":\"netX consult e.K.\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"width\":241,\"height\":240,\"caption\":\"netX consult e.K.\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netxconsult\\\/about\",\"https:\\\/\\\/www.youtube.com\\\/@netXconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/2a71da04439b566eb6d3d3719e41f764\",\"name\":\"Manuel Mayer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g\",\"caption\":\"Manuel Mayer\"},\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/author\\\/manuelnetx\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Passkeys \u2013 What IT Admins and Businesses Must Know","description":"Microsoft Passkeys explained: discover the two variants, their security benefits, and how businesses can successfully implement passkeys.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Passkeys \u2013 What IT Admins and Businesses Must Know","og_description":"Microsoft Passkeys explained: discover the two variants, their security benefits, and how businesses can successfully implement passkeys.","og_url":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/","og_site_name":"netX consult","article_published_time":"2025-07-29T09:00:34+00:00","article_modified_time":"2025-09-12T11:38:52+00:00","og_image":[{"width":1800,"height":1200,"url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/Passkeys_Microsoft.jpg","type":"image\/jpeg"}],"author":"Manuel Mayer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Manuel Mayer","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/#article","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/"},"author":{"name":"Manuel Mayer","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/2a71da04439b566eb6d3d3719e41f764"},"headline":"Passkeys in Microsoft &#8211; What IT admins and companies need to know!","datePublished":"2025-07-29T09:00:34+00:00","dateModified":"2025-09-12T11:38:52+00:00","mainEntityOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/"},"wordCount":8091,"commentCount":0,"publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/Passkeys_Microsoft.jpg","keywords":["IT-Security","Microsoft","Microsoft Entra","Microsoft Security"],"articleSection":["EN_IT_Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/","url":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/","name":"Microsoft Passkeys \u2013 What IT Admins and Businesses Must Know","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/Passkeys_Microsoft.jpg","datePublished":"2025-07-29T09:00:34+00:00","dateModified":"2025-09-12T11:38:52+00:00","description":"Microsoft Passkeys explained: discover the two variants, their security benefits, and how businesses can successfully implement passkeys.","breadcrumb":{"@id":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/#primaryimage","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/Passkeys_Microsoft.jpg","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2025\/07\/Passkeys_Microsoft.jpg","width":1800,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/netxconsult.de\/en\/blog\/passkeys-in-microsoft-what-it-admins-and-companies-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/netxconsult.de\/en\/"},{"@type":"ListItem","position":2,"name":"Passkeys in Microsoft &#8211; What IT admins and companies need to know!"}]},{"@type":"WebSite","@id":"https:\/\/netxconsult.de\/en\/#website","url":"https:\/\/netxconsult.de\/en\/","name":"netX consult","description":"IT-Beratung","publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netxconsult.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netxconsult.de\/en\/#organization","name":"netX consult e.K.","url":"https:\/\/netxconsult.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","width":241,"height":240,"caption":"netX consult e.K."},"image":{"@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/netxconsult\/about","https:\/\/www.youtube.com\/@netXconsult"]},{"@type":"Person","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/2a71da04439b566eb6d3d3719e41f764","name":"Manuel Mayer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g","caption":"Manuel Mayer"},"url":"https:\/\/netxconsult.de\/en\/blog\/author\/manuelnetx\/"}]}},"_links":{"self":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/11449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/comments?post=11449"}],"version-history":[{"count":0,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/11449\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/media\/11433"}],"wp:attachment":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/media?parent=11449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/categories?post=11449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/tags?post=11449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}